Abstract is missing.
- I'm not sure if we're okay: uncertainty for attackers and defendersMark E. Fioravanti II, Matt Bishop, Richard Ford. 1-10 [doi]
- Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable populationHassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, Elizeu Santos-Neto. 11-22 [doi]
- Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure securityAokun Chen, Pratik Prabhanjan Brahma, Dapeng Oliver Wu, Natalie Ebner, Brandon Matthews, Jedidiah R. Crandall, Xuetao Wei, Michalis Faloutsos, Daniela Oliveira. 23-35 [doi]
- Politikum: implications of security discourses for infrastructuresLaura Fichtner, Wolter Pieters, André Teixeira. 36-48 [doi]
- Content-based security for the webAlexander Afanasyev, J. Alex Halderman, Scott Ruoti, Kent E. Seamons, Yingdi Yu, Daniel Zappala, Lixia Zhang 0001. 49-60 [doi]
- (TEEBAG)Ranjbar A. Balisane, Andrew Martin. 61-67 [doi]
- Rethinking operating system design: asymmetric multiprocessing for security and performanceScott Brookes, Stephen Taylor. 68-79 [doi]
- Searching for software diversity: attaining artificial diversity through program synthesisGilmore R. Lundquist, Vishwath Mohan, Kevin W. Hamlen. 80-91 [doi]
- A case for the economics of secure software developmentChad Heitzenrater, Andrew C. Simpson. 92-105 [doi]